Font Size: a A A

The Research On Digital Rights Management In Mobile Telecommunication Network Environment

Posted on:2008-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y P HuaFull Text:PDF
GTID:2178360215982542Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
As the rapid development of data business in mobile telecommunication network, the protection for the digital content (like music, ring, video etc) is becoming more and more important. The digital rights management technology is used to protect the digital contents by the encryption and digital watermarking technology. It describes the contents, identifies them, trades them, protects them, monitors them and tracks them in the procedure of content production, distribution and consumption. It can protect the interests of the owners.At present, the DRM (Digital Rights Management) technology in mobile telecommunication network is not perfect. For example, OMA DRM takes PKI (Public Key Infrastructure) technology to enforce the security of this system. But it doesn't think about the capability of mobile terminal which has small storage and computing capability. And it is difficult to run. WDRM (Watermark-based DRM), using digital watermark technology only, and issued by some domestic scholar, can not stop the illegal distribution of digital content.In this paper, we analyzed all the kinds of technologies in DRM. And then we discussed the application requirements in mobile telecommunication network. At last, we proposed a DRM scheme which bases on WPKI (Wireless PKI), Digital Watermark technology and encryption. It can solve the problem which OMA DRM didn't think about and the bugs in the scheme using digital watermark only.In this scheme, we separated the digital content and the rights. For the content and the corresponding right is encapsulated and encrypted, only the specaial user who buys the rights can access the DRM content. In the client terminal, the security agent technology is used, which forces the user used the DRM content following the license. In this paper, we researched the encapsulation of DRM content and license for the DRM content. And we designed the procedure of the business protocol. At last, we analyzed the security of this scheme.
Keywords/Search Tags:Mobile Telecommunication Network, Digital Rights Management, WPKI, Digital Watermark Technology, Encryption
PDF Full Text Request
Related items